100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CIS Midterm Study Guide | Cyber Security Exam Answers | 100% Verified

Puntuación
-
Vendido
-
Páginas
19
Grado
A+
Subido en
21-06-2025
Escrito en
2024/2025

Ace your CIS Midterm 2024 with this comprehensive study guide! Covers CIA Triad, malware types (virus, Trojan, spyware), DNS poisoning, Cyber Kill Chain, encryption methods (symmetric/asymmetric), and more. Perfect for last-minute review—100% verified answers**."

Mostrar más Leer menos
Institución
CIS
Grado
CIS

Vista previa del contenido

CIS Midterm 2024- 2025 GRADE A 100% VERIFIED
Cyber Security - ANS>>> the prevention of damage to, protection of, and restoration of electronic
systems to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation


CIA Triad - ANS>>> Confidentiality, Integrity, Availability


Malware - ANS>>> malicious software, could be a virus or a Trojan horse


DNS - ANS>>> domain name system


Types of Threats - ANS>>> malware
intrusions
DoS
Security Breaches
Web Attacks
Session Hijacking
DNS poisoning
Insider Threats


Virus - ANS>>> a small program that replicates itself and hides itself inside other programs, usually
without your knowledge


Trojan Horse - ANS>>> A malicious program disguised as something desirable or harmless that captures
your information and returns it to the intruder


Spyware - ANS>>> the fastest growing category of malware used to spy on people


Logic Bomb - ANS>>> a type of spyware lays dormant until a condition is met (usually a date)


Key Logger - ANS>>> keeps track of keys hit- stores combinations of keys

,Cookies - ANS>>> used to spy on users whose original purpose was to help users surf the web


White Hat/Hacker - ANS>>> Hackers who break into systems for non-malicious reasons, not to steal or
wreak havoc, or those who hack with permission from a specific entity


Black Hat/Cracker - ANS>>> hackers with malicious intent


Gray Hat Hackers - ANS>>> refers to hackers who operate outside the law on occasion, hacks without
bad intent and permission


Social Engineering - ANS>>> intruding into a system using human nature, not technology


War driving - ANS>>> driving around looking for unprotected wireless networks


DOS/DDOS Attacks - ANS>>> Denial of service attack which attempt to deny authorized users access to
the system


Script Kiddies - ANS>>> inexperienced hacker


Ethical Hackers - ANS>>> consultants who are hired to do vulnerability assessments on company
systems


Firewall - ANS>>> filters ingress and egress network traffic


Proxy Server - ANS>>> acts as the host on your network disguising the IP dress of your internal host


Intrusion Detection System - ANS>>> monitors traffic, looking for attempted attacks


Least Privileges - ANS>>> The principle that any user or service will be given only enough access
privileges to do its job and no more

, nonrepudiation - ANS>>> A contractual stipulation to ensure that ebusiness participants do not deny
their online actions


critical infrastructure - ANS>>> Systems whose incapacity or destruction would have a debilitating
impact on the economic security of an organization, community, nation, etc


data at rest - ANS>>> stored data


data in transit - ANS>>> data transmitted from one location to another


data in use - ANS>>> data located in computer memory for processing


personally identifiable information (PII) - ANS>>> the name, postal address, or any other information
that allows tracking down the specific person who owns a device


protected health information (PHI) - ANS>>> Any information about health status, provision of health
care, or payment for health care that can be linked to an individual. This is interpreted rather broadly
and includes any part of a patient's medical record or payment history.


security as a service (SaaS) - ANS>>> The next generation of managed security services dedicated to the
delivery, over the Internet, of specialized information-security services.


cryptojacking - ANS>>> the secret use of your computing device to mine cryptocurrency


DNS poisoning - ANS>>> An attack that substitutes DNS addresses so that the computer is automatically
redirected to an attacker's device.


Phreaking - ANS>>> a subspecialty of hacking, breaking into telephone systems


Auditing - ANS>>> process of reviewing logs, records, and procedures to ensure established standards
are being met


Cyber Security Principles (the hand) - ANS>>> -Think like an adversary

Escuela, estudio y materia

Institución
CIS
Grado
CIS

Información del documento

Subido en
21 de junio de 2025
Número de páginas
19
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
johnwayne1

Conoce al vendedor

Seller avatar
johnwayne1 Howard Community College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
9 meses
Número de seguidores
3
Documentos
115
Última venta
4 meses hace
study hub

We are here to support you every step of the way in your academic journey, whether it's test practice, homework assistance, research guidance, data analysis, or any other form of reliable tutoring you require. Our primary goal is to provide our students with top-notch education that paves the way for excellent grades. Please don't hesitate to reach out with any questions, and we welcome your suggestions.

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes